Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Competitive routing in networks with polynomial costs., , , and . IEEE Trans. Automat. Contr., 47 (1): 92-96 (2002)Maximum Damage Malware Attack in Mobile Wireless Networks., , and . IEEE/ACM Trans. Netw., 20 (5): 1347-1360 (2012)A distributed virtual MIMO coalition formation framework for energy efficient wireless networks., , , and . EURASIP J. Wireless Comm. and Networking, (2015)Discrete-Event Control of Stochastic Networks - Multimodularity and Regularity., , and . Lecture notes in mathematics Springer, (2003)The Case for Non-Cooperative Multihoming of Users to Access Points in IEEE 802.11 WLANs., , and . INFOCOM, IEEE, (2006)Maximum Damage Malware Attack in Mobile Wireless Networks., , and . INFOCOM, page 749-757. IEEE, (2010)Optimal Activation and Transmission Control in Delay Tolerant Networks., , , and . INFOCOM, page 106-110. IEEE, (2010)New insights from a fixed point analysis of single cell IEEE 802.11 WLANs., , , and . INFOCOM, page 1550-1561. IEEE, (2005)Risk sensitive optimal control framework applied to delay tolerant networks., , , , and . INFOCOM, page 3146-3154. IEEE, (2011)A dynamic game solution to malware attack., , and . INFOCOM, page 2138-2146. IEEE, (2011)